浏览全部资源
扫码关注微信
1. 南京理工大学计算机科学与工程学院,江苏 南京 210094
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
3. 中国科学院大学网络空间安全学院,北京 100049
[ "苏铓(1987-),女,内蒙古赤峰人,博士,南京理工大学讲师,主要研究方向为云计算安全、访问控制、代理重加密等。" ]
[ "俞研(1972- ),男,吉林长春人,博士,南京理工大学副教授,主要研究方向为无线网络、网络空间安全等。" ]
[ "吴槟(1980-),男,山东青岛人,博士,中国科学院信息工程研究所副研究员,主要研究方向为网络与信息系统安全、信息对抗理论与技术等。" ]
[ "付安民(1981-),男,湖北通城人,博士,南京理工大学副教授,主要研究方向为云安全、隐私保护等。" ]
网络出版日期:2018-06,
纸质出版日期:2018-06-25
移动端阅览
苏铓, 俞研, 吴槟, 等. 面向代理重加密算法的程序设计语言研究[J]. 通信学报, 2018,39(6):89-97.
Mang SU, Yan YU, Bin WU, et al. Research on the programming language for proxy re-encryption[J]. Journal on communications, 2018, 39(6): 89-97.
苏铓, 俞研, 吴槟, 等. 面向代理重加密算法的程序设计语言研究[J]. 通信学报, 2018,39(6):89-97. DOI: 10.11959/j.issn.1000-436x.2018106.
Mang SU, Yan YU, Bin WU, et al. Research on the programming language for proxy re-encryption[J]. Journal on communications, 2018, 39(6): 89-97. DOI: 10.11959/j.issn.1000-436x.2018106.
通过结合领域专用语言(DSL),提出一种面向代理重加密的程序设计语言(PLPRE),PLPRE支持代理重加密算法结构明确、类似数学语言的描述,算法设计人员通过PLPRE能够实现重加密算法快捷、方便的描述,并通过解析工具最终产生与之对应的计算机编程语言代码。首先介绍了 PLPRE 的语法规范,给出了关键字、程序逻辑的定义,并以ACC-PRE算法为基础,给出了PLPRE的描述示例,其次描述了基于ANTLR工具的PLPRE的解析与实现流程,最后通过与相关工作的对比,阐述了PLPRE的优势。PLPRE的描述不需要关注数据结构、内存管理等问题,适用于不熟悉计算机编程的密码学家的描述算法,从而降低代理重加密算法研究中的设计与实现偏差。
The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed
which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE
and obtain the programming code for computer.Firstly
the grammar of PLPRE was presented
including the definitions of the keyword and programming logic
then the ACC-PRE algorithm was described by PLPRE as an example.Secondly
the PLPRE parser was realized by ANTLR.Finally
the comparisons between the PLPRE and the related work were made.By using the PLPRE
user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus
PLPRE will decrease the deviation between the design and implement for PRE.
张玉清 , 王晓菲 , 刘雪峰 , 等 . 云计算环境安全综述 [J ] . 软件学报 , 2016 , 27 ( 6 ): 1328 - 1348 .
ZHANG Y Q , WANG X F , LIU X F , et al . Survey on cloud computing security [J ] . Journal of Software , 2016 , 27 ( 6 ): 1328 - 1348 .
苏铓 , 史国振 , 谢绒娜 , 等 . 面向移动云计算的多要素代理重加密方案 [J ] . 通信学报 , 2015 , 36 ( 11 ): 73 - 79 .
SU M , SHI G Z , XIE R N , et al . Multi-element based on proxy re-encryption scheme for mobile cloud computing [J ] . Journal on Communications , 2015 , 36 ( 11 ): 73 - 79 .
SIDOROV E , Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library [J ] . Lecture Notes in Computer Science , 2015 , 2664 ( 4 ):956.
BENGER N , SCOTT M . Constructing tower extensions for the implementation of pairing-based cryptography [C ] // Springer Berlin Heidelberg . 2012 : 180 - 195 .
LYNN B . On the implementation of pairing-based cryptosystems [J ] . Dissertation Abstracts International , 2007 , 68 : 3903 - 3910 .
ATENIESE G , FU K , GREEN M , et al . Improved proxy re-encryption schemes with applications to secure distributed storage [J ] . ACM Transactions on Information & System Security , 2006 , 9 ( 1 ): 1 - 30 .
LEE P , MARK S , MATTHEWS J . A verifying core for a cryptographic language compiler [C ] // International Workshop on the ACL2 Theorem Prover and ITS Applications . 2006 : 1 - 10 .
LEVENT E , MATTHEWS J . High assurance programming in Cryptol [C ] // The 5th Annual Workshop on Cyber Security and Information Intelligence Research . 2009 : 60 - 61 .
AHMAD J J , LI S , SADEGHI A R , et al . CTL:a platform independent crypto tools library based on dataflow programming paradigm [C ] // International Conference on Financial Cryptography and Data Security . 2012 : 299 - 313 .
TOMB A . Automated verification of real-world cryptographic implementations [J ] . IEEE Security & Privacy , 2016 , 14 ( 6 ): 26 - 33 .
李凤华 , 阎军智 , 谢绒娜 , 等 . 面向分组密码算法的程序设计语言研究 [J ] . 电子学报 , 2009 , 37 ( 12 ): 2705 - 2710 .
LI F H , YAN J Z , XIE R N , et al . Research on the programming lan-guage for the block cipher algorithm [J ] . Acta Electronica Sinica , 2009 , 37 ( 12 ): 2705 - 2710 .
BOVET J , PARR T . ANTLRWorks:an ANTLR grammar development environment [J ] . Software Practice & Experience , 2008 , 38 ( 12 ): 1305 - 1332 .
SU M , LI F H , SHI G Z , et al . A user-centric data secure creation scheme in cloud computing [J ] . Chinese Journal of Electronics , 2016 , 25 ( CJE-4 ): 753 - 760 .
0
浏览量
1652
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构